Data Security - Kingston Knowledge Center
Read helpful articles by Kingston’s experts on data security and encryption for portable devices out in the filed as well as security best practices and advice in the enterprise and data center environment.

-
Top 12 Tips SMEs Can Take to Enhance Cybersecurity
We explore the top 12 tips small and medium size enterprises can take to enhance cybersecurity.
-
Kingston’s 3 Predictions for the Data Center and Enterprise IT in 2022
We’ve examined several factors using unique research to identify what may impact markets globally in 2022.
-
2022: Technology Expert Predictions
2021 has been a year full of challenges and innovations. But what will 2022 bring?
-
How to Close the Security Gap for Small and Medium-Size Enterprises
Prof. Sally Eaves shares her thoughts on the SME cybersecurity landscape and the need for education & support.
-
Sustained Commitment Required for Cybersecurity
Bill Mew shares his thoughts how the largest security challenges need commitment from the boardroom.
-
Are You Close to the Edge? Why Edge Computing Needs Security
Rob May shares his thoughts on how close we are to edge computing and the security it requires.
-
21st Century Private Diary
Write your diary digitally with a password protected, cloud backup solution.
-
How Does Hardware-Based SSD Encryption Work? Software vs Hardware, AES 256-bit and TCG Opal 2.0
Secure important personal and private information on a PC with a hardware encrypted SSD.
-
The Critical Roles of Data Centers During COVID-19
The pandemic has increased internet traffic which has placed importance on the role of data centers.
-
Data Loss Prevention in Our Remote Working World
The use of DLP software, VPNs, encrypted SSDs, and USBs will help mitigate some risks of remote working.
-
Should I Make the Switch to NVMe?
Cameron Crandall of Kingston helps you self-evaluate the need to move to your server storage solution to NVMe.
-
What is the difference between hardware vs software-based encryption for secure USB flash drives? - Kingston Technology
There are many advantages to using a dedicated hardware encryption processor in USB flash drives.